Bill Palisano, President of Lincoln Archives!... Scroll down to learn more...
Protect you, by protecting your information.
Information comes in many forms; from verbal conversations, handwritten notes, pictures, diagrams, hard copy files and records, to databases and electronically stored information. With good information, we can make better decisions.
The challenge is (and has always been) keeping relevant information easily accessible for as long as it’s valuable, then safely discarding information, when no longer useful. Another challenge is (and has always been) keeping that information easily accessible to those who should have access, while protecting it from those that should not. Fast, easy, convenient and consistent access along with proper security and safeguards are expected; today more than ever.
Lincoln Archives, Inc. was ‘born’ in an era where hard copy documents were the norm for storing information. Over the last three decades we’ve seen information storage and delivery systems ‘grow up’, ‘mature’ and advance. At the speed of light, information is accessed, used for decision making, then set aside for future reference or disposed of entirely. The world’s stored information is doubling at a staggering pace. The world’s information storage, delivery and security systems are racing to keep up.
When I formed this team and this corporation in 1993, we had (and have always had) one goal, one purpose: to protect you, by protecting your information. I knew that we’d have to continuously evolve with the needs of our clients. Over the last three decades, we’ve listened to you and learned. We’ve added many different forms of information storage, security, delivery and disposal services, based on what you told us you wanted. Keep telling us.
Rely on Lincoln
Four generations of trust since 1914.
Read: "Ransomware: a tale of two victims" article and learn
On January 23, the Buffalo Law Journal published an article written by our president, William Palisano. The article, entitled: "Ransomware: a tale of two victims" tells the story of two clients affected by this type of cyber-attack. They were similar attacks but had vastly different results. Read the article here, and learn how to protect yourself from this type of attack: